– Two (2) security vulnerabilities for the Oracle Database Server, Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials .

(CVE-2017-3486, CVE-2017-3567)
– One (1) security vulnerability for Oracle Secure Backup, this can be exploited remotely without authentication.

(CVE-2016-6290)
– Fourteen (14) security vulnerabilities for the Oracle Berkeley DB, None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials.

(CVE-2017-3512, CVE-2017-3514, CVE-2017-3511, CVE-2017-3526, CVE-2017-3509, CVE-2017-3533, CVE-2017-3544, CVE-2017-3539)
– Twenty one (21) security vulnerabilities for the Oracle Sun Systems Products Suite. Eight of these may be remotely exploitable without authentication.
– Fifteen (15) security vulnerabilities for the Oracle Virtualization. Six of these vulnerabilities may be remotely exploitable without authentication.
– Forty (40) security vulnerabilities for Oracle MySQL. Eleven of these vulnerabilities may be remotely exploitable without authentication.
– Thirteen (13) security vulnerabilities for the Oracle Support Tools. Four of these may be remotely exploitable without authentication.